<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Management inteface send packet port 137 to broadcast public IP in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/management-inteface-send-packet-port-137-to-broadcast-public-ip/m-p/38971#M28576</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you made this PAN firewall part of an AD domain? UDP port 137 appears to be some NETBIOS traffic and its unlikely that the management port will be spewing that out unless this PA has been included as a domain device.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 28 Aug 2013 21:56:16 GMT</pubDate>
    <dc:creator>sjamaluddin</dc:creator>
    <dc:date>2013-08-28T21:56:16Z</dc:date>
    <item>
      <title>Management inteface send packet port 137 to broadcast public IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/management-inteface-send-packet-port-137-to-broadcast-public-ip/m-p/38968#M28573</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I monitor traffic on management interface of 3020, I have seen so many packet from management IP to an broadcast IP &lt;/P&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0" class="tabcont" style="width: 100%;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD class="listr" nowrap="nowrap"&gt;Aug 23 14:49:24&lt;/TD&gt;&lt;TD class="listr" nowrap="nowrap"&gt; &lt;A href="https://192.168.35.251/diag_dns.php?host=192.168.15.15" title="Reverse Resolve with DNS"&gt;&lt;IMG border="0" class="jiveImage" src="https://ip1.i.lithium.com/a76ed0e94e5d2f53c8a8ffee3af7fdcec3450e5f/68747470733a2f2f3139322e3136382e33352e3235312f7468656d65732f706673656e73655f6e672f696d616765732f69636f6e732f69636f6e5f6c6f672e676966" /&gt;&lt;/A&gt; &lt;A href="https://192.168.35.251/easyrule.php?action=block&amp;amp;int=lan&amp;amp;src=192.168.15.15" title="Easy Rule: Add to Block List"&gt;&lt;IMG border="0" class="jiveImage" src="https://ip1.i.lithium.com/d86f117e25762ce5901efd112069ab8ebc6e8586/68747470733a2f2f3139322e3136382e33352e3235312f7468656d65732f706673656e73655f6e672f696d616765732f69636f6e732f69636f6e5f626c6f636b5f6164642e676966" /&gt;&lt;/A&gt; 192.168.1.15:35889&amp;nbsp; &lt;/TD&gt;&lt;TD class="listr" nowrap="nowrap"&gt; &lt;A href="https://192.168.35.251/diag_dns.php?host=203.77.255.255" title="Reverse Resolve with DNS"&gt;&lt;IMG border="0" class="jiveImage" src="https://ip1.i.lithium.com/a76ed0e94e5d2f53c8a8ffee3af7fdcec3450e5f/68747470733a2f2f3139322e3136382e33352e3235312f7468656d65732f706673656e73655f6e672f696d616765732f69636f6e732f69636f6e5f6c6f672e676966" /&gt;&lt;/A&gt; &lt;A href="https://192.168.35.251/easyrule.php?action=pass&amp;amp;int=lan&amp;amp;proto=udp&amp;amp;src=192.168.15.15&amp;amp;dst=203.77.255.255&amp;amp;dstport=137" title="Easy Rule: Pass this traffic"&gt;&lt;IMG border="0" class="jiveImage" src="https://ip1.i.lithium.com/e6042dfe6adedb39f5a51d0e07642da023e86d68/68747470733a2f2f3139322e3136382e33352e3235312f7468656d65732f706673656e73655f6e672f696d616765732f69636f6e732f69636f6e5f706173735f6164642e676966" /&gt;&lt;/A&gt; 203.77.255.255:&lt;SPAN title="Service 137/udp: netbios-ns"&gt;137&lt;/SPAN&gt;&amp;nbsp; &lt;/TD&gt;&lt;TD class="listr" nowrap="nowrap"&gt;UDP&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listr" nowrap="nowrap"&gt;Aug 23 14:49:24&lt;/TD&gt;&lt;TD class="listr" nowrap="nowrap"&gt; &lt;A href="https://192.168.35.251/diag_dns.php?host=192.168.15.15" title="Reverse Resolve with DNS"&gt;&lt;IMG border="0" class="jiveImage" src="https://ip1.i.lithium.com/a76ed0e94e5d2f53c8a8ffee3af7fdcec3450e5f/68747470733a2f2f3139322e3136382e33352e3235312f7468656d65732f706673656e73655f6e672f696d616765732f69636f6e732f69636f6e5f6c6f672e676966" /&gt;&lt;/A&gt; &lt;A href="https://192.168.35.251/easyrule.php?action=block&amp;amp;int=lan&amp;amp;src=192.168.15.15" title="Easy Rule: Add to Block List"&gt;&lt;IMG border="0" class="jiveImage" src="https://ip1.i.lithium.com/d86f117e25762ce5901efd112069ab8ebc6e8586/68747470733a2f2f3139322e3136382e33352e3235312f7468656d65732f706673656e73655f6e672f696d616765732f69636f6e732f69636f6e5f626c6f636b5f6164642e676966" /&gt;&lt;/A&gt; 192.168.1.15:52601&amp;nbsp; &lt;/TD&gt;&lt;TD class="listr" nowrap="nowrap"&gt; &lt;A href="https://192.168.35.251/diag_dns.php?host=203.77.255.255" title="Reverse Resolve with DNS"&gt;&lt;IMG border="0" class="jiveImage" src="https://ip1.i.lithium.com/a76ed0e94e5d2f53c8a8ffee3af7fdcec3450e5f/68747470733a2f2f3139322e3136382e33352e3235312f7468656d65732f706673656e73655f6e672f696d616765732f69636f6e732f69636f6e5f6c6f672e676966" /&gt;&lt;/A&gt; &lt;A href="https://192.168.35.251/easyrule.php?action=pass&amp;amp;int=lan&amp;amp;proto=udp&amp;amp;src=192.168.15.15&amp;amp;dst=203.77.255.255&amp;amp;dstport=137" title="Easy Rule: Pass this traffic"&gt;&lt;IMG border="0" class="jiveImage" src="https://ip1.i.lithium.com/e6042dfe6adedb39f5a51d0e07642da023e86d68/68747470733a2f2f3139322e3136382e33352e3235312f7468656d65732f706673656e73655f6e672f696d616765732f69636f6e732f69636f6e5f706173735f6164642e676966" /&gt;&lt;/A&gt; 203.77.255.255:&lt;SPAN title="Service 137/udp: netbios-ns"&gt;137&lt;/SPAN&gt;&amp;nbsp; &lt;/TD&gt;&lt;TD class="listr" nowrap="nowrap"&gt;UDP&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;I try to stop all service on management interface but it is not affect.&lt;/P&gt;&lt;P&gt;Please help me to stop these packet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Aug 2013 08:05:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/management-inteface-send-packet-port-137-to-broadcast-public-ip/m-p/38968#M28573</guid>
      <dc:creator>Register_Security</dc:creator>
      <dc:date>2013-08-23T08:05:40Z</dc:date>
    </item>
    <item>
      <title>Re: Management inteface send packet port 137 to broadcast public IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/management-inteface-send-packet-port-137-to-broadcast-public-ip/m-p/38969#M28574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have userid setup, that is if your PA-3020 is trying to reach some AD machine?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Aug 2013 08:27:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/management-inteface-send-packet-port-137-to-broadcast-public-ip/m-p/38969#M28574</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-08-26T08:27:31Z</dc:date>
    </item>
    <item>
      <title>Re: Management inteface send packet port 137 to broadcast public IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/management-inteface-send-packet-port-137-to-broadcast-public-ip/m-p/38970#M28575</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have user id enabled on public zone. &lt;/P&gt;&lt;P&gt;Here is a doc which explains why you might see alot of traffic to random public ip address with port 137.&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-4705"&gt;https://live.paloaltonetworks.com/docs/DOC-4705&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Let us know if this helped you resolve your issue.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks&lt;/P&gt;&lt;P&gt;Numan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Aug 2013 22:32:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/management-inteface-send-packet-port-137-to-broadcast-public-ip/m-p/38970#M28575</guid>
      <dc:creator>mbutt</dc:creator>
      <dc:date>2013-08-26T22:32:37Z</dc:date>
    </item>
    <item>
      <title>Re: Management inteface send packet port 137 to broadcast public IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/management-inteface-send-packet-port-137-to-broadcast-public-ip/m-p/38971#M28576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you made this PAN firewall part of an AD domain? UDP port 137 appears to be some NETBIOS traffic and its unlikely that the management port will be spewing that out unless this PA has been included as a domain device.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Aug 2013 21:56:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/management-inteface-send-packet-port-137-to-broadcast-public-ip/m-p/38971#M28576</guid>
      <dc:creator>sjamaluddin</dc:creator>
      <dc:date>2013-08-28T21:56:16Z</dc:date>
    </item>
    <item>
      <title>Re: Management inteface send packet port 137 to broadcast public IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/management-inteface-send-packet-port-137-to-broadcast-public-ip/m-p/38972#M28577</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for all reply.&lt;/P&gt;&lt;P&gt;I found and fixed the problem. &lt;/P&gt;&lt;P&gt;The reason is PAN auto enable "Microsoft Active Directory" my domain.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="ad-detect-enable.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/8327_ad-detect-enable.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Sep 2013 10:29:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/management-inteface-send-packet-port-137-to-broadcast-public-ip/m-p/38972#M28577</guid>
      <dc:creator>Register_Security</dc:creator>
      <dc:date>2013-09-17T10:29:51Z</dc:date>
    </item>
  </channel>
</rss>

